Follow

Submissions from 2010

PDF

Digital forensics and the issues of identity, Andrew Jones and Thomas Martin

PDF

Remote access forensics for VNC and RDP on Windows platform, Paresh Kerai

Link

Predator-Baiting Experiments for the Conservation of Rock-Wallabies in Western Australia: 25-Year Review with Recent Advances, J E. Kinnear, C J. Krebs, Craig Pentland, P Orell, Christopher Holme, and Reino Karvinen

Link

Patterns Relevant to the Temporal Data-Context of an Alarm of Interest, Savo Kordic, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li

Link

Computational Intelligence for Functional Testing, Chiou Peng Lam

PDF

Personal exposure of children to formaldehyde in Perth, Western Australia, Victoria S. Lazenby

Link

Adaptive T-S type Rough-Fuzzy Inference Systems (ARFIS) for Mobile Robot Navigation, Chang Su Lee

Link

Quantitative determination of glucoraphanin in Brassica vegetables by micellar electrokinetic capillary chromatography, Iris Lee, Mary C. Boyce, and Michael Breadmore

PDF

A Novel Subspace Outlier Detection Approach in High Dimensional Data Sets, Jinsong Leng

Link

Mining Outliers in Correlated Subspaces for High Dimensional Data Sets, Jinsong Leng and Tzung-Pei Hong

Analyzing Texture Features of Ballistic Projectile Images for Firearm Identification, Jinsong Leng, Zhihu Huang, and Dongguang Li

Link

Optical Imaging and Analysis of Firing-pin Marks for Ballistics Identification, Jinsong Leng, Zhihu Huang, and Dongguang Li

PDF

A Wrapper-Based Feature Selection for Analysis of Large Data Sets, Jinsong Leng, Craig Valli, and Leisa Armstrong

PDF

Android forensics: Simplifying cell phone examinations, Jeff Lessard and Gary Kessler

Link

A novel ballistics imaging system for firearm identification, Dongguang Li

Link

A novel binarization algorithm for ballistics firearm identification, Dongguang Li

Link

Color seal segmentation and identification, Dongguang Li

PDF

Behaviour profiling on mobile devices, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland

Link

Cross-Cultural Education: Learning Methodology and Behaviour Analysis for Asian Students in IT Field of Australian Universities, Jie Lu, Kum Chin, Juan Yao, Jun Xu, and Jitian Xiao

Link

State Model Diagrams - A Universal, Model Driven Method for Network System Configuration and Management, Stanislaw Maj

Link

An Evaluation of Firewall Configuration Methods, Stanislaw Maj, Woratat Makasiranondh, and David Veal

Link

State Model Diagrams - A Universal Runtime Network Management Tool, Stanislaw Maj, Woratat Makasiranondh, and David Veal

Link

An Evaluation of State Model Diagrams for Secure Network Configuration and Management, Stanislaw Maj and David Veal

Link

Evaluating Layer 3 Device Tunnelling and Access Control List Security Bandwidths Using B-node Theory, Stanislaw Maj and David Veal

Link

Parsimony Analysis - A Novel Method of Structured Knowledge Representation for Teaching Computer Science, Stanislaw Maj and David Veal

Link

Using State Model Diagrams to Manage Secure Layer 2 Switches, Stanislaw Maj and David Veal

Link

A Preliminary Evaluation of the new Cisco Network Security Course, Stanislaw Maj, David Veal, and Lotfi Yassa

Link

An integrated multimedia based platform for teaching network security, Woratat Makasiranondh, Stanislaw Maj, and David Veal

Link

Critical infrastructure protection risk modelling with games technology, Martin Masek, Adrian Boeing, and William Bailey

Link

Vulnerability of organic acid tolerant wetland biota to the effects of inorganic acidification, Clinton D. McCullough and Pierre Horwitz

Link

Factors affecting the sustainability of computer information systems: embedding new technology into a hospital environment, Donald Mcdermid, Linda Kristjanson, and Nigel Spry

Link

An information security governance encounter for Australian primary care health providers, Donald Mcdermid, Rachel Mahncke, and Patricia Williams

PDF

Estimation of prenatal exposure to glyphosate using maternal exposure assessment techniques, Heather L. McQueen

Link

The growing need for on-scene triage of mobile devices, Richard P. Mislan, Eoghan Casey, and Gary C. Kessler

PDF

Where new meanings spring: The relationship between Indigenous cultural meanings for freshwater springs and management practices: Analysis of stories from Kalbarri, Western Australia, Tamara Lee Murdock

PDF

An intelligence model for terrorist incident prevention for Australian police: A systemic investigation, Simon O’Rourke

Link

Breaches in Medical Information Security: The Problem of Reporting, Neha Patel and Patricia Williams

PDF

Defining appropriate options for post-closure land use of the Tamala Park Landfill in Western Australia, Marie Lourdes Raphael

PDF

Information technology capability within small-medium enterprises, Aurelio Ravarini

PDF

Employee Engagement with a Corporate Physical Activity Program: the Global Corporate Challenge, Pascal Scherrer, Lynnaire Sheridan, Ruth Sibson, Maria Ryan, and Nadine Henley

PDF

Interrogation of Water Catchment Data Sets Using Data Mining Techniques, Ajdin Sehovic, Leisa Armstrong, and Dean Diepeveen

PDF

Testing an exergame for effectiveness and attractiveness, Jeffrey Ronald Sinclair, Philip Hingston, Martin Masek, and Kazunori Nosaka

PDF

Assemblage turnover and taxonomic sufficiency of subtidal macroalgae at multiplespatial scales, Dan A. Smale, Gary A. Kendrick, and Thomas Wernberg

PDF

An investigation into short term latex pricing and national production forecasting decision support system for the public agricultural rubber industry in Thailand, Panida Subsorn

Link

An Evaluation of Agile Software Methodology Techniques, Anuradha Sutharshan and Stanislaw Maj

Link

An Efficient Method for Collecting Large Samples of Live Copepods Free from Detritus, Carl J Svensson, Glenn Hyndes, and Paul Lavery

PDF

The ADSL Router Forensics Process, Patryk Szewczyk

PDF

Ignorant Experts: Computer and Network Security Support From Internet Service Providers, Patryk Szewczyk and Craig Valli

PDF

An Analysis of Information Security Awareness within Home and Work Environments, Shuhaili Talib, Nathan Clarke, and Steven Furnell

PDF

The Western Australian charter boat industry: Working towards long-term sustainability, Carli Telfer

Link

Ecological performance and possible origin of a ubiquitous but under-studied gastropod, Mad S. Thomsen, Thomas Wernberg, Fernando Tuya, and Brian Silliman

PDF

Proximity to rocky reefs alters the balance between positive and negative effects on seagrass fauna, Fernando Tuya, Mathew Vanderklift, Glenn Hyndes, Thomas Wernberg, Mads Thomsen, and Christine Hanson

PDF

Application of a Data Mining Framework for the Identification of Agricultural Production Areas in WA, Yunous Vagh, Leisa Armstrong, and Dean Diepeveen

Link

Developing VoIP Router honeypots, Craig Valli and Mohammed Al Lawati

Link

Geotagging Where Cyberspace Comes to Your Place, Craig Valli and Peter Hannay

PDF

Stable isotopes reveal a consistent consumer-diet relationship across hundreds of kilometres, Mathew A. Vanderklift and Thomas Wernberg

Link

Fire in Rangelands and its Role in Management, Eddie Van Etten

Link

A Graphical User Interface for the Visually Impaired - an Evaluation, David Veal and Stanislaw Maj

Link

Origin, diversification and classification of the Australasian genus Dracophyllum (Richeeae, Ericaceae), Steven J. Wagstaff, Murray I. Dawson, Stephanus Venter, Jerome Munzinger, Darren M. Crayn, Dorothy A. Steane, and Kristina Lemson

Link

Investigating the surface of solid gold electrode to improve the sensitivity of anodic stripping voltammetry for arsenic detection, Magdalena Wajrak

Link

Investigation of electrochemically deposited arsenic on the surface of solid gold electrodes using SIMS, SEM and synchrotron soft X-rays, Magdalena Wajrak, Rob Hart, and Kathryn Prince

PDF

Turban Snails as Habitat for Foliose Algae: Contrasting Geographical Patterns in Species Richness, Thomas Wernberg, Fernando Tuya, Mads Thomsen, and Gary Kendrick

Link

Contribution of temporal and spatial components to morphological variation in the kelp Ecklonia (Laminariales), Thomas Wernberg and Mathew Vanderklift

Link

An ill-defined problem : effective biomedical informatics curriculum?, Patricia Williams

Link

Improving Medical Information Security using Contextualization Models, Patricia Williams

Link

Medical Information Security: Is it all too hard?, Patricia Williams

Exogenous Putrescine, Not Spermine or Spermidine, Enhances Root Mycorrhizal Development and Plant Growth of Trifoliate Orange (Poncirus trifoliata) seedlings, Qiangsheng Wu, Ying-Ning Zou, and Xinhua He

Link

Construction of Similarity Profile of Dynamic Web Documents for Similarity-aware Web Content Management, Jitian Xiao

Link

Cross-cultural learning challenges and teaching strategies for first-year Asian students in Australian universities, Jitian Xiao, Jie Lu, Kum Chin, Jun Xu, and Juan Yao

PDF

Autonomous Bee Colony Optimization for Multi-objective Function, F Zeng, James Decraene, Malcolm Low, Philip Hingston, C Wentong, Z Suiping, and M Chandramohan

Submissions from 2009

Link

The challenge of preserving rural industries and traditions in ultraperipheral Europe: Evidence from the Canary Islands, Abel D. Alonso, Pascal Scherrer, and Lynnaire Sheridan

Link

Media hegemony, activism and identity: Muslim women re-presenting Muslim women, Anne Aly

Link

The terrorists' audience: A model of internet radicalisation, Anne Aly

Link

An Intervention to Increase Positive Attitudes and Address Misconceptions About Australian Muslims: A Call for Education and Open Mindedness, Anne Aly, Anne Pedersen, Lisa Hartley, and Craig McGarty

An evaluation of Methodologies for eAgriculture in an Australian Context, Leisa J. Armstrong and Dean A. Diepeveen

An information-based decision support framework for eAgriculture, Leisa J. Armstrong and Dean A. Diepeveen

Link

Feeding ecology of green turtles (Chelonia mydas) from Shoalwater Bay, Australia, Karen Arthur, Kathryn Mcmahon, Col Limpus, and William Dennison

Link

Risk culture influences in internet safety and security, S Atkinson, S M. Furnell, and A.D. Phippen

Consensual Security Risk Assessment: Overcoming Bias, Conflicting Interests and Parochialism, Benjamin Beard and David Brooks

Link

Peat fires and air quality: Volatile organic compounds and particulates, David J. Blake, Andrea L. Hinwood, and Pierre Horwitz

Link

Freegate: A defence against the pending censorship of Australia?, C Bolan and P Hannay

Link

A spoofing attack against an EPC class one RFID system, Christopher Bolan

Link

From desktop to mobile: Examining the security experience, Reinhardt A. Botha, Steven Furnell, and Nathan Clarke

Link

Clipping Mercury's Wings: The Challenge of Email Archiving, Mark Brogan

RMAA Technology Survey 2008: From mainstream to bleeding edge-technology in the RIM workspace, Mark Brogan and David Roberts

Defeating biometric fingerprint systems: An applied testing methodology, David Brooks

Link

Intruder Alarm Systems: Is the Security Industry Installing and Maintaining Alarm Systems in Compliance to Australian Standard AS2201?, David Brooks

Link

Key concepts in security risk management: A psychometric concept map to approach to understanding, David Brooks

Link

What is security: Definition through knowledge categorisation, David Brooks

Link

Water stress vulnerability of four Banksia species in contrasting ecohydrological habitats on the Gnangara Mound, Western Australia [journal article], Caroline Canham, Raymond Froend, and William Stock

PDF

Health and the nature of urban green spaces, May Elizabeth Carter

Link

Tourism research to tourism practice: The need for adaptive institutions in Western Australia's Ningaloo region, Kelly Chapman, Pierre Horwitz, Pascal Scherrer, and Jeremy Northcote

Link

The Alox5 gene is a novel therapeutic target in cancer stem cells of chronic myeloid leukemia, Yaoyu Chen, Dongguang Li, and Shaoguang Li

Cross-cultural learning and teaching in Australian universities, Kum Leng Chin, Jie Lu, Jun Xu, Jitian Xiao, and Juan Yao

Link

Shade-induced response and recovery of the seagrass Posidonia sinuosa, Catherine Collier, Paul Lavery, Peter J Ralph, and Ray J Masini

Link

Digital natives or digital refugees? Why we have failed Gen Y?, Barbara Combes

Generation Y: Are they really digital natives or more like digital refugees?, Barbara Combes

Security Decay: An Entropic Approach to Definition and Understanding, M COOLE and David Brooks

Intelligence Support to Law Enforcement: Untangling the Gordian Knot, Jeffrey Corkill

Professional Intelligence Judgement Artistry: Some early observations, Jeffrey Corkill